Skip to main content
  • Conference proceedings
  • © 2014

Advances in Cryptology -- ASIACRYPT 2014

20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8874)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security

Conference proceedings info: ASIACRYPT 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Encryption Schemes

    1. Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security

      • Benoît Libert, Marc Joye, Moti Yung, Thomas Peters
      Pages 1-21
    2. Efficient Identity-Based Encryption over NTRU Lattices

      • Léo Ducas, Vadim Lyubashevsky, Thomas Prest
      Pages 22-41
    3. Order-Preserving Encryption Secure Beyond One-Wayness

      • Isamu Teranishi, Moti Yung, Tal Malkin
      Pages 42-61
  3. Outsourcing and Delegation

    1. Statistically-secure ORAM with \(\tilde{O}(\log^2 n)\) Overhead

      • Kai-Min Chung, Zhenming Liu, Rafael Pass
      Pages 62-81
    2. Adaptive Security of Constrained PRFs

      • Georg Fuchsbauer, Momchil Konstantinov, Krzysztof Pietrzak, Vanishree Rao
      Pages 82-101
  4. Obfuscation

    1. Using Indistinguishability Obfuscation via UCEs

      • Christina Brzuska, Arno Mittelbach
      Pages 122-141
  5. Homomorphic Cryptography

    1. Authenticating Computation on Groups: New Homomorphic Primitives and Applications

      • Dario Catalano, Antonio Marcedone, Orazio Puglisi
      Pages 193-212
    2. Compact VSS and Efficient Homomorphic UC Commitments

      • Ivan DamgÃ¥rd, Bernardo David, Irene Giacomelli, Jesper Buus Nielsen
      Pages 213-232
  6. Secret Sharing

    1. Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model

      • Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk
      Pages 233-253
    2. Secret-Sharing for NP

      • Ilan Komargodski, Moni Naor, Eylon Yogev
      Pages 254-273
  7. Block Ciphers and Passwords

    1. Tweaks and Keys for Block Ciphers: The TWEAKEY Framework

      • Jérémy Jean, Ivica Nikolić, Thomas Peyrin
      Pages 274-288
    2. Memory-Demanding Password Scrambling

      • Christian Forler, Stefan Lucks, Jakob Wenzel
      Pages 289-305
  8. Side Channel Analysis II

    1. Side-Channel Analysis of Multiplications in GF(2128)

      • Sonia Belaïd, Pierre-Alain Fouque, Benoît Gérard
      Pages 306-325
    2. Higher-Order Threshold Implementations

      • Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
      Pages 326-343
    3. Masks Will Fall Off

      • Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul
      Pages 344-365

Other Volumes

  1. Advances in Cryptology – ASIACRYPT 2014

About this book

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Editors and Affiliations

  • Applied Statistics Unit, Indian Statistical Institute, Kolkata,, India

    Palash Sarkar

  • Nagoya University, Japan

    Tetsu Iwata

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access